Sciweavers

3032 search results - page 427 / 607
» Description Logic Rules
Sort
View
150
Voted
HOST
2011
IEEE
14 years 12 days ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
115
Voted
CAISE
2004
Springer
15 years 6 months ago
Achieving Enterprise Model Interoperability through the Model-Based Architecture Framework for Enterprises
This paper describes an ontology for enterprise modelling, The ontology has enabled conceptual integration of two different modelling methodologies, one based on UEML (Unified Ente...
Håvard D. Jørgensen, Oddrun Pauline O...
199
Voted
VLDB
2003
ACM
160views Database» more  VLDB 2003»
16 years 1 months ago
Composing Web services on the Semantic Web
Service composition is gaining momentum as the potential silver bullet for the envisioned Semantic Web. It purports to take the Web to unexplored efficiencies and provide a flexibl...
Brahim Medjahed, Athman Bouguettaya, Ahmed K. Elma...
ITS
1998
Springer
133views Multimedia» more  ITS 1998»
15 years 5 months ago
The Foundations and Architecture of Autotutor
The Tutoring Research Group at the University of Memphis is developing an intelligent tutoring system which takes advantages of recent technological advances in the areas of semant...
Peter M. Wiemer-Hastings, Arthur C. Graesser, Dere...
104
Voted
CAISE
2006
Springer
15 years 4 months ago
An Interactive, Asymmetric and Extensional Method for Matching Conceptual Hierarchies
Our work deals with schema or ontology matching and is driven by the following statements: (1) Most of works only consider intensional description of schemas; (2) They mostly use s...
Jérôme David, Fabrice Guillet, R&eacu...